Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/03/2023, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe
Resource
win10-20230220-en
General
-
Target
c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe
-
Size
282KB
-
MD5
c4a753cba44513a08633debb49377043
-
SHA1
d39adae6b1dd80d71ecdaeabfb6e954ab9b8c38a
-
SHA256
c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931
-
SHA512
1b1a8b63e91499e11510d9131ba496aef47c1a984cce8e8d92d9d605dff6ee6b4a7b2cf27c90716fad8b4df5a0baf76beae91fee2ba03982e08d1108c52429b8
-
SSDEEP
3072:cI/YVTLJ1HphkGVIPISS/NxfpBj1bCBQKEcueHeo1FQTCv0:jGLljtSYLKHewQT
Malware Config
Extracted
smokeloader
lab
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3220 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 3124 2900 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3124 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe 3124 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3220 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3124 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3124 2900 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe 66 PID 2900 wrote to memory of 3124 2900 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe 66 PID 2900 wrote to memory of 3124 2900 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe 66 PID 2900 wrote to memory of 3124 2900 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe 66 PID 2900 wrote to memory of 3124 2900 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe 66 PID 2900 wrote to memory of 3124 2900 c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe"C:\Users\Admin\AppData\Local\Temp\c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe"C:\Users\Admin\AppData\Local\Temp\c3f39e57adff415bc2bedff041ee16615a456c178fb1c22a0a827bbb352c0931.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3124
-